Title | Journal | Journal Categories | Citations | Publication Date |
---|---|---|---|---|
On computable isomorphisms in efficient asymmetric pairing-based systems | Discrete Applied Mathematics |
| 16 | 2007 |
Efficient pairing computation on supersingular Abelian varieties | Designs, Codes and Cryptography |
| 115 | 2007 |
Identity-based key agreement protocols from pairings | International Journal of Information Security |
| 143 | 2007 |
Efficient ID-KEM based on the Sakai–Kasahara key construction | IEE Proceedings - Information Security | 10 | 2006 | |
The Eta pairing revisited | 2006 |
Title | Journal | Journal Categories | Citations | Publication Date |
---|---|---|---|---|
An anonymous authentication scheme with conditional privacy-preserving for Vehicular Ad hoc Networks based on zero-knowledge proof and Blockchain | Ad Hoc Networks |
| 1 | 2024 |
How can the holder trust the verifier? A CP-ABPRE-based solution to control the access to claims in a self-sovereign-identity scenario | Blockchain: Research and Applications |
| 2024 | |
A regulated anonymous cryptocurrency with batch linkability | Computer Standards & Interfaces |
| 1 | 2024 |
Key-aggregate based access control encryption for flexible cloud data sharing | Computer Standards & Interfaces |
| 2024 | |
AASSI: A Self-Sovereign Identity Protocol With Anonymity and Accountability | IEEE Access |
| 2024 |